Discussion Paper (Person Mapping)

 Subject: Security Architecture & Design Please suit to BOTH of the forthcoming investigations: Question A   Acknowledge at lowest two types of accounts that should not be mapped to a person; illustrate your reasoning. Question B Each week, investigation a singular tidings anecdote or expression akin to Notification Security/Information Technology. Column a epitome of what you read to the disdirection continuity, gladden to-boot afford a coalesce to the primordial expression. Origin is your choice; so-far gladden largely name your origin. Please suit to the primal investigation by "Wednesday", column should be 150 to 200 language, but may go longer depending on the material.  (primal column, palpably offer well-reasoned ideas and concepts). If you use any origin beyond of your own thoughts, you should intimation that origin. Include weighty rhetoric, punctuation, decision constitution, and spelling. "NO PLAGIARISM" Learning Materials and References (Prof columned in direction syllabus) Required Resources Shostack, Adam. Threat Modeling: Designing for Security, Indianapolis, IN: Wiley, 2014 Recommended Resources Please use the forthcoming author’s names, book/expression titles, Web sites, and/or keylanguage to pursuit for supplementary notification to raise your tuition in this material. Tony UcedaVelez and Marco M. Morana Rick Centric Threat Modeling: Process for Attack Simulation and Threat Analysis